-
1
-
-
0141762461
-
Code-red: A case study on the spread and victims of an internet worm
-
November
-
D. Moore, C. Shannon, and J. Brown, "Code-Red: A Case Study on the Spread and Victims of an Internet Worm," in Internet Measurement Workshop, November 2002.
-
(2002)
Internet Measurement Workshop
-
-
Moore, D.1
Shannon, C.2
Brown, J.3
-
4
-
-
0001126172
-
Pricing via processing or combatting junk mail
-
C. Dwork and M. Naor, "Pricing via Processing or Combatting Junk Mail," in Crypto, 1992.
-
(1992)
Crypto
-
-
Dwork, C.1
Naor, M.2
-
5
-
-
0017959977
-
Secure communications over insecure channels
-
April
-
R. Merkle, "Secure Communications Over Insecure Channels," Communications of the ACM, vol. 21, no. 4, April 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.4
-
-
Merkle, R.1
-
6
-
-
12244282921
-
CAPTCHA: Using hard AI problems for security
-
L. von Ahn, M. Blum, N. Hopper, and J. Langford, "CAPTCHA: Using Hard AI Problems for Security," in Eurocrypt 2003., 2003.
-
(2003)
Eurocrypt 2003
-
-
Von Ahn, L.1
Blum, M.2
Hopper, N.3
Langford, J.4
-
7
-
-
0002459783
-
Client puzzles: A cryptographic defense against connection depletion
-
A. Juels and J. Brainard, "Client Puzzles: A Cryptographic Defense Against Connection Depletion," in NDSS, 1999, pp. 151-165.
-
(1999)
NDSS
, pp. 151-165
-
-
Juels, A.1
Brainard, J.2
-
9
-
-
84949979635
-
DOS-resistant authentication with client puzzles
-
T. Aura, P. Nikander, and J. Leiwo, "DOS-Resistant Authentication with Client Puzzles," Lecture Notes in Computer Science, vol.2133, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2133
-
-
Aura, T.1
Nikander, P.2
Leiwo, J.3
-
10
-
-
1642344572
-
Towards network denial of service resistant protocols
-
J. Leiwo, T. Aura, and P. Nikander, "Towards Network Denial of Service Resistant Protocols," in SEC, 2000, pp. 301-310.
-
(2000)
SEC
, pp. 301-310
-
-
Leiwo, J.1
Aura, T.2
Nikander, P.3
-
11
-
-
2442603590
-
Security for peer-to-peer routing overlays
-
December
-
M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D. Wallach, "Security for Peer-to-Peer Routing Overlays," in Proceedings of OSDI, December 2002.
-
(2002)
Proceedings of OSDI
-
-
Castro, M.1
Druschel, P.2
Ganesh, A.3
Rowstron, A.4
Wallach, D.5
-
12
-
-
3242814357
-
-
M. Abadi, M. Burrows, M. Manasse, and T. Wobber, "Moderately Hard, Memory-bound Functions," 2003.
-
(2003)
Moderately Hard, Memory-bound Functions
-
-
Abadi, M.1
Burrows, M.2
Manasse, M.3
Wobber, T.4
-
13
-
-
33744479345
-
Freenet: A distributed anonymous information storage and retrieval system
-
I. Clarke, O. Sandberg, B. Wiley, and T. Hong, "Freenet: A Distributed Anonymous Information Storage and Retrieval System," Lecture Notes in Computer Science, vol. 2009, pp. 46+, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2009
, pp. 46
-
-
Clarke, I.1
Sandberg, O.2
Wiley, B.3
Hong, T.4
-
16
-
-
84976845043
-
End-to-end arguments in system design
-
November
-
J. Saltzer, D. Reed, and D. Clark, "End-To-End Arguments in System Design," ACM Transactions on Computer Systems, vol. 2, no. 4, pp. 277-288, November 1984.
-
(1984)
ACM Transactions on Computer Systems
, vol.2
, Issue.4
, pp. 277-288
-
-
Saltzer, J.1
Reed, D.2
Clark, D.3
-
17
-
-
85010849899
-
Denial of service via algorithmic complexity attacks
-
August
-
S. Crosby and D. Wallach, "Denial of Service via Algorithmic Complexity Attacks," in USENIX Security Symposium, August 2003.
-
(2003)
USENIX Security Symposium
-
-
Crosby, S.1
Wallach, D.2
-
18
-
-
0003375670
-
An analysis of using reflectors for distributed denial-of-service attacks
-
July
-
V. Paxson, "An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks," Computer Communication Review, vol. 31. no. 3, July 2001.
-
(2001)
Computer Communication Review
, vol.31
, Issue.3
-
-
Paxson, V.1
-
19
-
-
0038687767
-
Efficient, DoS-resistant, secure key exchange for internet protocols
-
W. Aiello, S. Bellovin, M. Blaze, J. Ioannidis, O. Reingold, R. Canetti, and A. Keromytis, "Efficient, DoS-resistant, Secure Key Exchange for Internet Protocols," in Conference on Computer and Communications Security, 2002.
-
(2002)
Conference on Computer and Communications Security
-
-
Aiello, W.1
Bellovin, S.2
Blaze, M.3
Ioannidis, J.4
Reingold, O.5
Canetti, R.6
Keromytis, A.7
-
25
-
-
25644437770
-
Building a robust network-processor-based router
-
October
-
T. Spalink, S. Karlin, L. Peterson, and Y. Gottlieb, "Building a Robust Network-Processor-Based Router," in Proceedings of ACM SOSP, October 2001.
-
(2001)
Proceedings of ACM SOSP
-
-
Spalink, T.1
Karlin, S.2
Peterson, L.3
Gottlieb, Y.4
-
26
-
-
0003286492
-
The TLS protocol version 1.0
-
January
-
T. Dierks and C. Allen, "The TLS Protocol Version 1.0," RFC 2246, January 1999.
-
(1999)
RFC
, vol.2246
-
-
Dierks, T.1
Allen, C.2
-
27
-
-
85084161244
-
Dos and don'ts of client authentication on the web
-
August
-
K. Fu, E. Sit, K. Smith, and N. Feamster, "Dos and Don'ts of Client Authentication on the Web," in USENIX Security Symposium, August 2001.
-
(2001)
USENIX Security Symposium
-
-
Fu, K.1
Sit, E.2
Smith, K.3
Feamster, N.4
-
30
-
-
0003232377
-
Internet control message protocol
-
September
-
J. Postal, "Internet Control Message Protocol," RFC 792, September 1981.
-
(1981)
RFC
, vol.792
-
-
Postal, J.1
-
32
-
-
0002624024
-
Tracing anonymous packets to their approximate source
-
December
-
H. Burch and W. Cheswick, "Tracing Anonymous Packets to Their Approximate Source," in USENIX LISA, December 2000.
-
(2000)
USENIX LISA
-
-
Burch, H.1
Cheswick, W.2
-
33
-
-
0033650584
-
Practical network support for IP traceback
-
S. Savage, D. Wetherall, A. Karlin, and T. Anderson, "Practical Network Support for IP Traceback," in SIGCOMM, 2000, pp. 295-306.
-
(2000)
SIGCOMM
, pp. 295-306
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
34
-
-
0038223869
-
Hash-based IP traceback
-
August
-
A. Snoeren, C. Partridge, L. Sanchez, C. Jones, F. Tchakountio, S. Kent, and W. Strayer, "Hash-based IP Traceback," in SIGCOMM, August 2001.
-
(2001)
SIGCOMM
-
-
Snoeren, A.1
Partridge, C.2
Sanchez, L.3
Jones, C.4
Tchakountio, F.5
Kent, S.6
Strayer, W.7
-
35
-
-
0034997397
-
Advanced and authenticated marking schemes for IP traceback
-
D. Song and A. Perrig, "Advanced and Authenticated Marking Schemes for IP Traceback," in INFOCOM 2001, 2001, pp. 878-886.
-
(2001)
INFOCOM 2001
, pp. 878-886
-
-
Song, D.1
Perrig, A.2
-
36
-
-
84861252355
-
-
ICMP Traceback Working Group, "ICMP Traceback (itrace)," http://www.ietf.org/html.charters/itrace-charter.html, 2002.
-
(2002)
ICMP Traceback (Itrace)
-
-
-
38
-
-
4544272175
-
Controlling high bandwidth aggregates in the network
-
July
-
R. Mahajan, S. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. Shenker, "Controlling High Bandwidth Aggregates in the Network," Computer Communication Review, vol. 32, no. 3, July 2002.
-
(2002)
Computer Communication Review
, vol.32
, Issue.3
-
-
Mahajan, R.1
Bellovin, S.2
Floyd, S.3
Ioannidis, J.4
Paxson, V.5
Shenker, S.6
-
39
-
-
3543120323
-
Persistent dropping: An efficient control of traffic aggregates
-
August
-
H. Jamjoom and K. Shin, "Persistent Dropping: An Efficient Control of Traffic Aggregates," in SIGCOMM, August 2003.
-
(2003)
SIGCOMM
-
-
Jamjoom, H.1
Shin, K.2
-
41
-
-
35048820228
-
Mayday: Distributed filtering for internet services
-
March
-
D. Andersen, "Mayday: Distributed Filtering for Internet Services," in USITS, March 2003.
-
(2003)
USITS
-
-
Andersen, D.1
-
42
-
-
33751110528
-
Taming IP packet flooding attacks
-
K. Lakshminarayanan, D. Adkins, A. Perrig, and I. Stoica, "Taming IP Packet Flooding Attacks," in Hot Topics in Networks (HotNets-II), 2003.
-
(2003)
Hot Topics in Networks (HotNets-II)
-
-
Lakshminarayanan, K.1
Adkins, D.2
Perrig, A.3
Stoica, I.4
-
43
-
-
0034449536
-
Implementing a distributed firewall
-
S. Ioannidis, A. Keromytis, S. Bellovin, and J. Smith, "Implementing a Distributed Firewall," in ACM Conference on Computer and Communications Security, 2000, pp. 190-199.
-
(2000)
ACM Conference on Computer and Communications Security
, pp. 190-199
-
-
Ioannidis, S.1
Keromytis, A.2
Bellovin, S.3
Smith, J.4
-
44
-
-
14844310899
-
Hashcash: A denial of service counter-measure
-
Cypherspace, August
-
A. Back, "Hashcash: A Denial of Service Counter-Measure," Tech. Rep., Cypherspace, August 2002, http://cypherspace.org/hashcash/hashcash.pdf.
-
(2002)
Tech. Rep.
-
-
Back, A.1
-
45
-
-
14844282689
-
Guaranteeing access in spite of service-flooding attacks
-
April
-
V. Gligor, "Guaranteeing Access in Spite of Service-Flooding Attacks," in Security Protocols Workshop, April 2003.
-
(2003)
Security Protocols Workshop
-
-
Gligor, V.1
-
46
-
-
0003216023
-
Internet protocol, version 6 (IPv6) specification
-
December
-
S. Deering and R. Hinden, "Internet Protocol, Version 6 (IPv6) Specification," RFC 2460, December 1998.
-
(1998)
RFC
, vol.2460
-
-
Deering, S.1
Hinden, R.2
-
48
-
-
0027647490
-
Random early detection gateways for congestion avoidance
-
August
-
S. Floyd and V. Jacobson, "Random Early Detection Gateways for Congestion Avoidance," ACM/IEEE Transactions on Networking, vol. 1, no. 4, pp. 397-413, August 1993.
-
(1993)
ACM/IEEE Transactions on Networking
, vol.1
, Issue.4
, pp. 397-413
-
-
Floyd, S.1
Jacobson, V.2
-
49
-
-
50049083730
-
-
Intel, "Intel IXP2850 Network Processor," http://www.Intel.com/ design/network/products/npfamily/ixp2850.htm, 2003.
-
(2003)
Intel IXP2850 Network Processor
-
-
-
51
-
-
0035012756
-
Stochastic fair blue: A queue management algorithm for enforcing fairness
-
April
-
W. Feng, D. Kandlur, D. Saha, and K. Shin, "Stochastic Fair Blue: A Queue Management Algorithm for Enforcing Fairness," in Proc. of INFOCOM, April 2001.
-
(2001)
Proc. of INFOCOM
-
-
Feng, W.1
Kandlur, D.2
Saha, D.3
Shin, K.4
-
55
-
-
85084164413
-
Bro: A system for detecting network intruders in real-time
-
January
-
V. Paxson, "Bro: A System for Detecting Network Intruders in Real-Time," in 10th Annual USENIX Security Symposium, January 1998.
-
(1998)
10th Annual USENIX Security Symposium
-
-
Paxson, V.1
-
56
-
-
84861246951
-
Distributed intrusion detection system
-
DShield.org, "Distributed Intrusion Detection System," http://www.dshield.org, 2002.
-
(2002)
DShield.org
-
-
|